Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The CISO's API Security Paradox: High Priority, Huge Blind Spots

In today’s digital-first world, APIs serve as the core infrastructure of modern business. They power mobile applications, facilitate critical cloud integrations, and support digital transformation initiatives. It's therefore understandable that 73% of CISOs consider API security a top or critical concern. However, a recent survey of 300 security leaders uncovers a troubling paradox: a large gap between awareness and action.

Securing Public Institutions with Cloudflare One

Florida’s colleges, universities, and public agencies are under pressure to manage growing cyber threats while supporting hybrid access and stretched resources. Join Tom Coffey, Senior SASE Specialist at Cloudflare, to learn how organizations like yours are adopting Zero Trust and SASE with Cloudflare One to simplify security, reduce costs, and improve performance.

What is Cloud Access Security Broker (CASB)?

Cloud apps make work easier, but they also open the door to new security risks. This blog unpacks everything you need to know, like: what is CASB in cyber security, how it works, and why it matters. We break down the core pillars of CASB, share real-world use cases, and help you understand the benefits it brings to your business.

How to Build a Security Team That Actually Enables the Business with Olivier Busolini

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Olivier Busolini, Group Head of Information Security at Mashreq, to explore how cybersecurity leadership has transformed from a purely technical function to a strategic business partnership.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.

Beyond the Hype: Why Adaptive AI is Essential for Modern SOCs

Artificial Intelligence (AI) has revolutionized Security Operations Centers (SOCs), automating threat triage and response. But not every AI is equipped to handle today’s evolving cyber threats. Many SOC platforms still rely on static, pre-trained models designed for yesterday’s attack patterns, leaving modern organizations vulnerable.

Introducing simple and secure egress policies by hostname in Cloudflare's SASE platform

Cloudflare’s SASE platform is on a mission to strengthen our platform-wide support for hostname- and domain-based policies. This mission is being driven by enthusiastic demands from our customers, and boosted along the way by several interesting engineering challenges. Today, we’re taking a deep dive into the first milestone of this mission, which we recently released in open beta: egress policies by hostname, domain, content category, and application. Let’s dive right in!

Inside the AI Threat Landscape: From Jailbreaks to Prompt Injections and Agentic AI Risks

AI has officially moved out of the novelty phase. What began with people messing around with LLM-powered GenAI tools for content creation has rapidly evolved into a complex web of agentic AI systems that form a critical part of the modern corporate landscape. However, this transformation has given new life to old threats, transforming the API security landscape all over again.

Why Traditional DLP Fails in the Age of Cloud and Collaboration Tools

DLP emerged at a time when corporate IT environments were relatively straightforward. Employees worked primarily from corporate offices, data resided in on-premises servers, and communications happened through company-managed email systems and file shares. Traditional DLP solutions were designed to thrive in this environment.

ISO 27017 Cloud Controls: List of Tasks for Providers

Most of the time on the Ignyte blog, we talk about overarching security frameworks like FedRAMP, CMMC, and ISO 27001. Sometimes, though, it’s worth digging deeper into smaller-scale elements of these frameworks. Today’s target is ISO 27017, the ISO/IEC publication focusing on cloud service security. What does this document entail, who needs to use it, and what does compliance involve? Let’s discuss.